cirosantilli / notes
Random notes I want to backup.
☆18Updated 2 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- A tool to extract code from individual functions in a library.☆16Updated 5 months ago
- NanoBSD build system for FreeBSD☆16Updated 9 years ago
- The TCP Scanner☆24Updated 2 years ago
- ☆17Updated 6 years ago
- System tracer implementation in Rust☆32Updated 8 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 6 months ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Source code for the beta release of CobraDroid☆14Updated 5 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- tamper resistant audit log☆18Updated 6 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- A DNS library for Rust.☆23Updated last month
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- This is the ToRat server, a part of the ToRat Project.☆22Updated 5 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- ☆16Updated 7 years ago
- ☆36Updated 12 years ago
- BIOS-based boot menu and loader☆16Updated 8 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- A collection of shellcodes☆68Updated 13 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- ☆12Updated 7 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- A ptrace based sandbox. (PoC)☆14Updated 6 years ago
- A socket to rule all other sockets.☆9Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago